Security and Baseline Anomalies Base Lining Is Essay

Total Length: 702 words ( 2 double-spaced pages)

Total Sources: 0

Page 1 of 2

Security and Baseline Anomalies

Base lining is the performance of measuring and evaluation the presentation of a network in instantaneous situations. Provision of a network baseline calls for quizzing and reporting of physical connectivity, throughout the range of network usage. Such in-detailed network scrutiny is required in identifying problems associated with speed, accessibility, and finding vulnerabilities within the network. Predefined security settings are put in place to manage large security networks. These settings can be applied on a number of similar computers in a network. Settings and templates helps to reduce the occurrence of errors and omissions and this also helps in securing the servers.

How to obtain a baseline system

A baseline system of network behavior can be obtained through sub-netting a network. This entails dividing a network into smaller networks through a series of routers. Routers help to improve the security of the sub-nets by regulating the users within the network accessibility. Several methods can be applied to achieve a secure network that is a DMZ (Demilitarized Zone) system and a VLAN (Virtual Local Area Network) system.

Stuck Writing Your "Security and Baseline Anomalies Base Lining Is" Essay?

A DMZ functions by denying access to untrusted outsiders from accessing the secure network perimeter. A VLAN allows users who are on an area of short distance to access a secure network (remote) that is sub-netted as though the grounds are similar.

Anomalies and baseline behavior

A baseline anomaly is an unusual network behavior that could indicate a network security threat in relation to baseline behavior. Network Behavior Anomaly Detection (NBAD) is a safety technique used in monitoring network for signs of bizarre activity. This program is enacted by establishing a baseline, overseeing at in situations of normal network and user behavioral characteristics. With the acquisition of such information, identification of various aspects within the system can be a direct indicator of threats; threats are categorized in different forms depending on the target areas for example, the worms, malware and viruses.

Why anomalies are worth investigating

Investigation is vital as it aids in triggering quick detection of viruses and worms that replicate on the server system, cause unscheduled reboots of the system….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Security And Baseline Anomalies Base Lining Is" (2012, May 06) Retrieved June 25, 2025, from
https://www.aceyourpaper.com/essays/security-baseline-anomalies-base-lining-79821

Latest MLA Format (8th edition)

Copy Reference
"Security And Baseline Anomalies Base Lining Is" 06 May 2012. Web.25 June. 2025. <
https://www.aceyourpaper.com/essays/security-baseline-anomalies-base-lining-79821>

Latest Chicago Format (16th edition)

Copy Reference
"Security And Baseline Anomalies Base Lining Is", 06 May 2012, Accessed.25 June. 2025,
https://www.aceyourpaper.com/essays/security-baseline-anomalies-base-lining-79821